|  |  | 
 
 
 
               
                | 
 This OCP module is designed to identify and raise the awareness 
                  of potential vulnerabilities, loopholes and weak links that 
                  exist in the client's operating environment so as to avoid costly 
                  and irreversible errors that would otherwise become apparent 
                  only when the undesired event occurs and the disaster plan and 
                  recovery strategy are implemented.
 
 Vulnerabilities or seeds of disaster are generally apparent 
                  and readily visible but often overlooked and neglected. They 
                  generally embody an unnecessarily high risk of susceptibility 
                  to impact. But on a positive note, vulnerabilities can be reduced 
                  with relatively small investment of money, time and effort.
 
 Arresting the potential vulnerabilities, loopholes and weak 
                  links that exist in the client's operating environment before 
                  they become costly and irreversible errors minimizes the level 
                  of risk exposure of the client to an acceptable level and enhances 
                  the overall corporate's confidence level that all reasonable 
                  and practicable steps have been taken to ensure the smooth operations 
                  of the business. It considerably increases the probability that 
                  the company will be out of harm's way whenever an undesirable 
                  event occurs.
 
 Vulnerabilities identification is the quest for at-risk conditions, 
                  hence honesty and thoroughness are two important criteria in 
                  exposing vulnerabilities in the company.
 
 In general, there are three kinds of vulnerabilities. Firstly, 
                  vulnerabilities that place the company at an exceedingly or 
                  excessively high level of risk and they warrant rectification 
                  without any delay. Secondly, vulnerabilities that unnecessarily 
                  places the company at a level of risk higher than the acceptable 
                  level. Lastly, apparent vulnerabilities that will be discovered 
                  and when analyzed, turned out to be at a level of risk so low 
                  that rectification is not deemed necessary or that the cost 
                  of rectification to lower the level of risk is excessive in 
                  terms of the ultimately achieved risk level.
 
 In conclusion, the lesser vulnerabilities present in the client's 
                  operating environment, the lower the risk exposure it faces.
 
 
 |  
 |  | 
 
 
 
 
 |